MetaFilter posts tagged with nsa and effhttp://www.metafilter.com/tags/nsa+eff
Posts tagged with 'nsa' and 'eff' at MetaFilter.Tue, 27 Jan 2015 13:42:50 -0800Tue, 27 Jan 2015 13:42:50 -0800en-ushttp://blogs.law.harvard.edu/tech/rss60This plan isn't for the next two weeks or three months.http://www.metafilter.com/146511/This%2Dplan%2Disnt%2Dfor%2Dthe%2Dnext%2Dtwo%2Dweeks%2Dor%2Dthree%2Dmonths
<a href="https://www.eff.org/deeplinks/2015/01/effs-game-plan-ending-global-mass-surveillance">EFF's Game Plan for Ending Global Mass Surveillance</a>
<br>For years, we've been working on a strategy to end mass surveillance of digital communications of innocent people worldwide. Today we're laying out the plan, so you can understand how all the pieces fit together—that is, how U.S. advocacy and policy efforts connect to the international fight and vice versa. Decide for yourself where you can get involved to make the biggest difference. tag:metafilter.com,2015:site.146511Tue, 27 Jan 2015 13:42:50 -0800andoatnpWho is really listening?http://www.metafilter.com/142961/Who%2Dis%2Dreally%2Dlistening
An <a href="http://en.wikipedia.org/wiki/International_mobile_subscriber_identity">international mobile subscriber identity (IMSI)</a> is a unique number, usually fifteen digits, associated with Global System for Mobile Communications (GSM) and Universal Mobile Telecommunications System (UMTS) network mobile phone users. An IMSI catcher is a device, used by the <a href="https://firstlook.org/theintercept/2014/02/10/the-nsas-secret-role/">NSA drone program</a>, <a href="https://www.eff.org/deeplinks/2012/10/stingrays-biggest-unknown-technological-threat-cell-phone-privacy">the police</a>, <a href="http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-the-mobile-cybercriminal-underground-market-in-china.pdf">criminals</a>, <a href="http://www.theverge.com/2014/9/18/6394391/phony-cell-towers-are-the-next-big-security-risk">Chinese spammers</a> and <a href="http://www.washingtonpost.com/world/national-security/researchers-try-to-pull-back-curtain-on-surveillance-efforts-in-washington/2014/09/17/f8c1f590-3e81-11e4-b03f-de718edeb92f_story.html">spies all around Washington DC</a> and <a href="http://www.radio.cz/en/section/curraffrs/spy-games-turn-real-as-eavesdropping-technology-spreads">the world</a> to spoof the identity of a GSM cell tower and intercept cellular voice and data communication. They <a href="https://github.com/SecUpwN/Android-IMSI-Catcher-Detector#want-to-know-what-imsi-catchers-look-like">come in</a> all sizes and flavors, from <a href="http://www.septier.com/368.html">tiny</a> or <a href="http://arstechnica.com/security/2013/09/the-body-worn-imsi-catcher-for-all-your-covert-phone-snooping-needs/">body-worn</a> professional surveillance devices, to <a href="http://www.alibaba.com/countrysearch/CN/imsi-catcher.html">easy to order off the shelf solutions</a>, to <a href="http://www.williamlong.info/archives/3614.html">Chinese</a> <a href="http://lcx.cc/?i=4072">DIY</a> (links in Chinese) and have spawned efforts to retaliate with an<a href="https://secupwn.github.io/Android-IMSI-Catcher-Detector/"> IMSI-catcher-catcher</a>. IMSI-catcher technology has become <a href="https://www.eff.org/search/site/stingray">increasingly widespread</a>, with far-reaching <a href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2458076">constitutional</a> and <a href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2437678">technical</a> implications. tag:metafilter.com,2014:site.142961Mon, 22 Sep 2014 08:32:09 -0800T.D. StrangeFrom "Not The Onion"http://www.metafilter.com/141797/From%2DNot%2DThe%2DOnion
<a href="http://dailycaller.com/2014/08/08/nsa-tried-to-delete-court-transcript-in-lawsuit-over-deleting-evidence/">NSA Tried To Delete Court Transcript In Lawsuit Over Deleting Evidence</a> On three separate occasions in the Jewel V. NSA case, the NSA sought to delete evidence. Then it sought to redact the transcript. tag:metafilter.com,2014:site.141797Sat, 09 Aug 2014 13:45:17 -0800Sleeper30c3http://www.metafilter.com/135333/30c3
While Jacob Appelbaum <a href="https://www.metafilter.com/135212/Digital-Black-Bag-Ops">grabbed headlines with his NSA revelations</a> at this year's <a href="http://www.ccc.de/en/home">Chaos Communication Congress</a>, other presentations provided equally fascinating insight into how the world works. Learn how data mining is bringing <a href="http://www.youtube.com/watch?v=CBQ8xRM3jQk">perpetrators of genocide to justice</a> (<a href="http://media.ccc.de/browse/congress/2013/30C3_-_5405_-_en_-_saal_g_-_201312291730_-_data_mining_for_good_-_patrick.html">alt</a>), how an artist uses different <a href="http://www.youtube.com/watch?v=HTVgPw7TR_k">concepts of secrecy landscapes</a> (<a href="http://media.ccc.de/browse/congress/2013/30C3_-_5604_-_en_-_saal_1_-_201312282300_-_seeing_the_secret_state_six_landscapes_-_trevor_paglen.html">alt</a>) to keep tabs on clandestine activities, and how <a href="http://www.youtube.com/watch?v=9A91idibgT0">India's surveillance state continues to grow</a> (<a href="http://media.ccc.de/browse/congress/2013/30C3_-_5552_-_en_-_saal_g_-_201312291130_-_india_s_surveillance_state_-_maria_xynou.html">alt</a>).
<a href="https://www.metafilter.com/123560/Not-My-Department">previously</a> A few additional highlights:
Glenn Greenwald delivered the <a href="https://www.youtube.com/watch?v=xEJIR0-KJu0">keynote address</a> [<a href="http://media.ccc.de/browse/congress/2013/30C3_-_5622_-_en_-_saal_1_-_201312271930_-_30c3_keynote_-_glenn_greenwald_-_frank.html">alt</a>].
<a href="http://www.youtube.com/watch?v=NckL48CMbVo">Policing the Romantic Crowd</a> [<a href="http://media.ccc.de/browse/congress/2013/30C3_-_5447_-_en_-_saal_6_-_201312271730_-_policing_the_romantic_crowd_-_matu.html">alt</a>]. Professor Richard Marggraf Turley and Anne Marggraf-Turley examine the use of surveillance technologies during the Romantic period, and the similarities to their modern counterparts. At last year's CCC, the two gave a talk on <a href="http://www.youtube.com/watch?v=dLGxAAabkz8">Romantic Hackers</a>.
<a href="http://www.youtube.com/watch?v=0c08EYv4N5A">Electronic Bank Robberies</a> [<a href="http://media.ccc.de/browse/congress/2013/30C3_-_5476_-_en_-_saal_2_-_201312271600_-_electronic_bank_robberies_-_tw_-_sb.html">alt</a>]. Security researchers analyze malware which has been infecting ATMs and uncover the business behind how malware is used to steal money from cash machines. They're not the first to <a href="http://vimeo.com/18582091">jackpot an ATM</a>, but modern criminals have interesting ways to make sure their <a href="http://en.wikipedia.org/wiki/Money_mule">mules</a> don't walk away with their money.
<a href="http://www.youtube.com/watch?v=txRdOjgokQ4">Backdoors, Government Hacking and the Next Crypto Wars</a> [<a href="http://media.ccc.de/browse/congress/2013/30C3_-_5478_-_en_-_saal_g_-_201312292145_-_backdoors_government_hacking_and_the_next_crypto_wars_-_christopher_soghoian.html">alt</a>]. ACLU Technologist <a href="https://twitter.com/csoghoian">Christopher Soghoian</a> discusses the slowly increasing deployment of cryptography, use of hacking software by federal and local law enforcement, and how government requests may move from asking for individual user data to asking for encryption keys used to protect all user data.
<a href="https://www.youtube.com/watch?v=XZYo9TPyNko">To Protect and Infect: The Militarization of the Internet</a>. <a href="https://twitter.com/botherder">Claudio Guarnieri</a> and <a href="https://twitter.com/headhntr">Morgan Marquis-Boire</a> discuss the deployment and capabilities of commercial spying suites such as FinFisher and how they are used by repressive governments to spy on dissidents.
<a href="http://www.youtube.com/watch?v=DWg2qEEa9CE">No Neutral Ground in a Burning World</a> [<a href="http://media.ccc.de/browse/congress/2013/30C3_-_5491_-_en_-_saal_1_-_201312272300_-_no_neutral_ground_in_a_burning_world_-_quinn_norton_-_eleanor_saitta.html">alt</a>]. <a href="https://twitter.com/quinnnorton">Quinn Norton</a> and <a href="https://twitter.com/Dymaxion">Eleanor Saitta</a> discuss the views and expectations of governments and cultural institutions through the longer lens of history.
<a href="http://www.youtube.com/watch?v=BMwPe2KqYn4">Through a PRISM, Darkly</a> [<a href="http://media.ccc.de/browse/congress/2013/30C3_-_5255_-_en_-_saal_1_-_201312301400_-_through_a_prism_darkly_-_kurt_opsahl.html">alt</a>]. <a href="https://twitter.com/kurtopsahl">Kurt Opsahl</a> of the EFF provides clarity regarding the history and codenames of the NSA's spying programs, what programs we know are currently being used, as well as insight into how to help stop the spying.
<a href="http://www.youtube.com/watch?v=QMZ2FB574JY">ID Cards in China</a> (<a href="http://media.ccc.de/browse/congress/2013/30C3_-_5543_-_en_-_saal_2_-_201312291245_-_id_cards_in_china_your_worst_nightmare_-_kate_krauss.html">alt</a>). How electronic ID cards carried by Chinese residents contain health information such as HIV status, political affiliations, and more. Talk discusses history of tracking, who has access to this data, and what it means for human rights.
<a href="http://www.youtube.com/watch?v=9-m6EqvgVwM">Towards an affordable brain-computer interface</a> (<a href="http://media.ccc.de/browse/congress/2013/30C3_-_5395_-_en_-_saal_6_-_201312291600_-_towards_an_affordable_brain-computer-interface_-_dominic_-_anne.html">alt</a>).
<a href="http://www.youtube.com/watch?v=HJB1mYEZPPA">The Year In Crypto</a> (<a href="http://media.ccc.de/browse/congress/2013/30C3_-_5339_-_en_-_saal_1_-_201312281830_-_the_year_in_crypto_-_nadia_heninger_-_djb_-_tanja_lange.html">alt</a>).
<a href="http://www.youtube.com/watch?v=IePG2fzKvF0">Drones</a> (<a href="http://media.ccc.de/browse/congress/2013/30C3_-_5406_-_en_-_saal_1_-_201312291245_-_drones_-_piotr_esden-tempski.html">alt</a>).
You can find many additional (largely more technical) videos available for <a href="http://ftp.ccc.de/congress/2013/">download</a> and <a href="http://media.ccc.de/browse/congress/2013/">viewing</a> in several formats (as well as on <a href="http://www.youtube.com/playlist?list=PLOcrXzpA0W82rsJJKrmeBlY3_MS0uQv3h">Youtube</a>). tag:metafilter.com,2014:site.135333Sat, 04 Jan 2014 09:28:21 -0800antonymousIRS Claims Authority to Read Your E-Mail Without A Warranthttp://www.metafilter.com/126938/IRS%2DClaims%2DAuthority%2Dto%2DRead%2DYour%2DEMail%2DWithout%2DA%2DWarrant
<a href="http://www.aclu.org/blog/technology-and-liberty-national-security/new-documents-suggest-irs-reads-emails-without-warrant">The ACLU reports that the IRS claims in an internal document that it has the authority to access citizens' online communications without a warrant.</a> The IRS claimed in a 2009 document that "the Fourth Amendment does not protect communications held in electronic storage, such as email messages stored on a server, because internet users do not have a reasonable expectation of privacy in such communications." It still retains that position even after the 2010 case of <a href="http://en.wikipedia.org/wiki/United_States_v._Warshak">US v Warshak</a> which determined that citizens have a reasonable expectation of privacy in such communications. The IRS to this day declares in bland language that no warrant is required for e-mails held by an ISP for more than 180 days. (One <a href="http://www.irs.gov/irm/part9/irm_09-004-006.html#d0e319">relevant document</a>). A <a href="http://news.cnet.com/8301-13578_3-57578839-38/irs-claims-it-can-read-your-e-mail-without-a-warrant/">CNET article</a> gives additional context.
The ACLU is currently awaiting a response to its <a href="http://www.aclu.org/national-security/warrantless-electronic-communications-foia-requests">FOIA requests to other agencies</a> like the FBI and Justice Department for information on their policies, procedures, and practices in reading citizens' private communications.
The related case of <a href="https://www.eff.org/cases/jewel">Jewel v NSA</a>, in which the EFF is suing the NSA on behalf of AT&amp;T users for the NSA's dragnet surveillance of Americans' electronic communication, is ongoing (after nearly being completely dismissed on the grounds that nobody has standing to challenge the practice because it's secret). <blockquote>"Evidence in the case includes undisputed documents provided by former AT&amp;T telecommunications technician Mark Klein showing AT&amp;T has routed copies of Internet traffic [including ~1.7 billion e-mails etc. daily] to a secret room in San Francisco controlled by the NSA. It also includes declarations from three NSA whistleblowers along with a mountain of other evidence."</blockquote>
The government's use of electronic surveillance is <a href="http://www.metafilter.com/120542/Electronic-surveillance-skyrockets-in-the-US">increasing dramatically</a> each year. tag:metafilter.com,2013:site.126938Thu, 11 Apr 2013 13:11:55 -0800SleeperElectronic surveillance skyrockets in the UShttp://www.metafilter.com/120542/Electronic%2Dsurveillance%2Dskyrockets%2Din%2Dthe%2DUS
The Justice Department, after a legal battle with the ACLU to avoid having to admit it, <a href="http://www.aclu.org/blog/national-security-technology-and-liberty/new-justice-department-documents-show-huge-increase">recently released</a> <a href="http://www.aclu.org/technology-and-liberty/pen-register-trap-and-trace-foia-request-documents-released-department">documents</a> showing that the federal government's use of warrantless "pen register" and "tap and trace" surveillance has multiplied over the past decade. But the Justice Department is small potatoes. <a href="http://www.businessinsider.com/infographic-how-the-nsa-intercepts-the-electronic-communications-of-americans-2012-5">Every day, the NSA intercepts and stores 1.7 billion emails, phone calls, texts, and other electronic communications.</a> (Previously on Metafilter: <a href="http://www.metafilter.com/117724/listening-in">Mobile Phone Surveillance by the numbers</a>, <a href="http://www.metafilter.com/117682/If-youve-got-nothing-to-hide">Former NSA officials sue NSA over NSA misconduct</a>, <a href="http://www.metafilter.com/93890/The-tangled-webs-we-weave">Washington Post's project on government surveillance</a>, <a href="http://www.metafilter.com/115239/Worker-bees-can-leave-Even-drones-can-fly-away-The-Queen-is-their-slave">Map of organizations authorized to use drones in the US</a>)
<a href="http://blogs.wsj.com/digits/2012/09/28/the-economics-of-surveillance/">Surveillance is ubiquitous.</a> Do we really need more data, or do we need better data &amp; analysis? The Washington Post's project on electronic surveillance raised some important points:
<blockquote><a href="http://projects.washingtonpost.com/top-secret-america/articles/a-hidden-world-growing-beyond-control/print/">* Many security and intelligence agencies</a> do the same work [as each other], creating redundancy and waste. For example, 51 federal organizations and military commands, operating in 15 U.S. cities, track the flow of money to and from terrorist networks.
* Analysts who make sense of documents and conversations obtained by foreign and domestic spying share their judgment by publishing 50,000 intelligence reports each year - <b>a volume so large that many are routinely ignored.</b>
....improvements have been overtaken by volume at the ODNI, as the increased flow of intelligence data overwhelms the system's ability to analyze and use it. Every day, collection systems at the National Security Agency intercept and store 1.7 billion e-mails, phone calls and other types of communications. The NSA sorts a fraction of those into 70 separate databases. The same problem bedevils every other intelligence agency, none of which have enough analysts and translators for all this work.</blockquote>
To deal with the information glut, the government is turning to <a href="http://en.wikipedia.org/wiki/Surveillance#Data_mining_and_profiling">artificial intelligence</a> for help. AI surveillance has also gone from cyberspace to meatspace: Known projects for sorting through the high volume of video surveillance include the military-developed <a href="http://www.nytimes.com/2011/01/02/science/02see.html?_r=1&pagewanted=all">Mind's Eye</a> (still in the works) and the privately-developed <a href="https://trapwire.com/trapwire.html">Trapwire</a>, <a href="http://www.aclu.org/blog/technology-and-liberty-free-speech-national-security/what-make-trapwire-story">(already in use here)</a>.
Sooner or later it will be standard for security cameras to be able to identify individuals and recognize their actions at least as well as the Xbox Kinect can.
Updates on the legal status of domestic surveillance:
1.The House of Representatives last month <a href="http://www.theverge.com/2012/9/12/3324148/warrantless-wiretap-bill-passes-us-house-domestic-spying">re-approved the FISA bill</a>, and the bill is <a href="http://www.govtrack.us/congress/bills/112/s3276">now ready</a> to pass in the Senate as well.
2. In August a federal appeals court ruled that <a href="http://www.wired.com/threatlevel/2012/08/appeals-court-oks-wiretapping/?utm_source=Contextly&amp;utm_medium=RelatedLinks&amp;utm_campaign=Previous">the federal government may spy on Americans' communications without warrants and without fear of being sued</a> in the case of <i>Al-Haramain Islamic V. Obama</i>. This case is all over unless the Supreme Court agrees to hear it.
3. The Electronic Frontier Foundation's case <i><a href="https://www.eff.org/cases/jewel">Jewel v. NSA</a></i> challenges the NSA's enormous domestic spying operation. It looked like a lost cause, but it's now up for a hearing on December 14, 2012.
4. The <a href="http://www.washingtonpost.com/politics/supreme-court-warrants-needed-in-gps-tracking/2012/01/23/gIQAx7qGLQ_story.html">Supreme Court ruled</a> earlier this year that law enforcement officers can't sneak a GPS tracking device onto an individual's vehicle unless they get a warrant first.
5. (From Salon): <blockquote><a href="http://www.salon.com/2012/05/24/warrantless_spying_fight/">the Obama administration</a> is aggressively seeking to block any efforts to have federal courts rule on the constitutionality of this new FISA law. Immediately after its 2008 passage, the ACLU, on behalf of journalists, activists, and writers, sued to invalidate the law on the ground that it violates the Fourth Amendment rights of Americans by subjecting them to warrantless eavesdropping. As they always do in such cases, the Bush and Obama DOJs demanded dismissal of the suit on the ground of "standing": namely, they asserted the definitively Kafkaesque claim that because the list of Americans who have their conversations intercepted is kept secret, the plaintiffs cannot prove they were eavesdropped on under the law, and thus lack "standing" to challenge it.</blockquote>
The widespread use of electronic surveillance couldn't occur without the assistance of the telecommunications companies. The Electronic Frontier Foundation reports: <blockquote><a href="https://www.eff.org/issues/nsa-spying">The undisputed documents</a> show that AT&amp;T installed a fiberoptic splitter at its facility at 611 Folsom Street in San Francisco that makes copies of all emails web browsing and other Internet traffic to and from AT&amp;T customers and provides those copies to the NSA. This copying includes both domestic and international Internet activities of AT&amp;T customers. As one expert observed "this isn't a wiretap, it's a country-tap."</blockquote>
The ACLU lists several ways that telecommunications companies <a href="http://www.aclu.org/blog/technology-and-liberty-national-security/aclu-findings-other-law-enforcement-telecom">stumble over themselves to meet the government's requests for private information</a>: Copying of existing messages to a separate account, The Voicemail PIN Reset, Voicemail "cloning," etc.
Related: <a href="http://www.thenewamerican.com/usnews/item/12188-drone-use-increases-worldwide-trade-rep-says-only-the-guilty-need-fear">Spy drone usage increases domestically and globally. Last year saw the first-ever drone-assisted arrest of a US citizen,</a> as well as <a href="http://www.npr.org/2011/09/30/140959250/debate-erupts-over-legality-of-al-awlakis-killing">the first-ever drone-assisted killing of a US citizen by the US government.</a>
Lastly, coming soon to a city near you: <a href="http://en.wikipedia.org/wiki/Gorgon_Stare">Gorgon Stare</a> , a drone-mounted city-spanning surveillance system planned to be deployed in Afghanistan that could eventually be deployed in the US. (Man, who named that thing?) It's designed to be combined with visual recognition technology like <a href="http://en.wikipedia.org/wiki/Mind%27s_Eye_%28US_Military%29">Mind's Eye</a>. With this, they won't need to put a GPS tracker on anyone's car.<br> tag:metafilter.com,2012:site.120542Wed, 03 Oct 2012 21:02:11 -0800SleeperIf you've got nothing to hidehttp://www.metafilter.com/117682/If%2Dyouve%2Dgot%2Dnothing%2Dto%2Dhide
"Now we have three former NSA officials confirming the basic facts. Neither the Constitution nor federal law allow the government to collect massive amounts of communications and data of innocent Americans and fish around in it in case it might find something interesting. This kind of power is too easily abused. We're extremely pleased that more whistleblowers have come forward to help end this massive spying program." - the EFF <a href="https://www.eff.org/press/releases/three-nsa-whistleblowers-back-effs-lawsuit-over-governments-massive-spying-program">announces</a> that three former employees of the NSA have come forward to testify in their <a href="https://www.eff.org/cases/jewel/">lawsuit against the NSA</a> over the domestic spying program. tag:metafilter.com,2012:site.117682Sun, 08 Jul 2012 10:40:58 -0800crayzRoom 641Ahttp://www.metafilter.com/74349/Room%2D641A
<a href="http://www.eff.org/deeplinks/2008/08/secret-room-eff-designers-cartoon-illegal-spying">The Secret Room:</a> EFF Designer's <a href="http://www.youtube.com/watch?v=agN7S5Siy1o">Cartoon on Illegal Spying</a>. <small>[<a href="http://www.boingboing.net/">Via</a>]</small> <a href="http://blog.wired.com/27bstroke6/2008/08/appeals-court-p.html">Appeals Court Punts on AT&amp;T Spying Case Appeal</a>
<a href="http://blog.wired.com/27bstroke6/2008/08/rights-group-su.html">Rights Group Suing AT&amp;T for Spying Will Sue Government Too</a> tag:metafilter.com,2008:site.74349Sat, 23 Aug 2008 13:05:51 -0800homunculusYou had to live -- did live, from the habit that became instinct and the assumption that every sound you made was overheard.http://www.metafilter.com/58824/You%2Dhad%2Dto%2Dlive%2Ddid%2Dlive%2Dfrom%2Dthe%2Dhabit%2Dthat%2Dbecame%2Dinstinct%2Dand%2Dthe%2Dassumption%2Dthat%2Devery%2Dsound%2Dyou%2Dmade%2Dwas%2Doverheard
<a href="http://www.pbs.org/now/shows/307/index.html">For Your Eyes Only? Allegations that the government is reading your e-mails, with the help of AT&T.</a> The latest episode of <a href=http://www.pbs.org/now/>NOW</a> did a good piece on the <a href=http://texaskaos.com/showDiary.do?diaryId=2644>NSA's domestic surveillance program</a> (previously discussed <a href=http://www.metafilter.com/57937/Your-world-delivered-to-the-NSA>here</a>.) It can be viewed on their website. Meanwhile, Canadian human rights attorney Maureen Webb has written a <a href="http://www.amazon.com/exec/obidos/ASIN/0872864766/metafilter-20/ref=nosim/">new book</a> on the scope of government surveillance, and found that <a href=http://www.democracynow.org/article.pl?sid=07/02/20/1523257>the use of sophisticated methods to search for terrorists is not identifying the right suspects</a>. tag:metafilter.com,2007:site.58824Wed, 21 Feb 2007 00:33:17 -0800homunculusYour world, delivered to the NSAhttp://www.metafilter.com/57937/Your%2Dworld%2Ddelivered%2Dto%2Dthe%2DNSA
<a href="http://www.talkleft.com/story/2007/1/20/05952/8776">AT&T Ducks Accountability.</a> <a href=http://informationweek.com/news/showArticle.jhtml;jsessionid=5MVW55OMHE3GGQSNDLRSKHSCJUNN2JVN?articleID=196902271>Lawsuits, Questions</a> Follow <a href=http://www.eff.org/legal/cases/att/>NSA Surveillance Approval.</a> tag:metafilter.com,2007:site.57937Sun, 21 Jan 2007 21:59:02 -0800homunculusAT&T-NSA documents leakedhttp://www.metafilter.com/51770/ATampTNSA%2Ddocuments%2Dleaked
<a href="http://www.wired.com/news/technology/0,70947-0.html?tw=wn_technology_1">Wired News</a> has obtained a copy of a file detailing AT&amp;T's involvement with the NSA that was sealed in the EFF's class-action lawsuit against AT&amp;T. At 2AM EST this morning they have <a href="http://www.wired.com/news/technology/0,70944-0.html">published that file</a> on their site for anyone to download <small><small>(this is the fixed link, the one on Wired is currently broken)</small></small>.<small><small><b>[<a href="http://www.digg.com/technology/Wired_News_leaks_FULL_AT_T_NSA_documents_">via</a>]</b></small></small> tag:metafilter.com,2006:site.51770Mon, 22 May 2006 05:24:48 -0800RyvarEFF Whistleblower Wiretapping Suit Halted by Nuclear Optionhttp://www.metafilter.com/51346/EFF%2DWhistleblower%2DWiretapping%2DSuit%2DHalted%2Dby%2DNuclear%2DOption
<a href="http://www.wired.com/news/technology/security/0,70785-0.html?tw=wn_politics_1">Bush administration signals intent</a> to invoke the obscure <a href="http://en.wikipedia.org/wiki/State_Secrets_Privilege">state secrets privilege</a> in order to stop the <a href="http://www.eff.org">EFF</a> lawsuit against <a href="http://news.com.com/2061-10796_3-6058346.html">AT&amp;T</a>, (previously discussed <a href="http://www.metafilter.com/mefi/50714">here</a>) for providing the NSA direct access <a href="http://www.wired.com/news/technology/0,70126-0.html">all 312 terabytes</a> of its customers' telephone and internet traffic since 2001, (including those Good Vibrations charges you racked up).
In a nutshell, according to legal experts, invoking the privilege kills the judicial process dead: the courthouse doors are closed, and there's nothing but grownup stuff to see here; move along, kids. tag:metafilter.com,2006:site.51346Tue, 02 May 2006 19:47:00 -0800squirrelAT&T-->NSA. WTF? -EFFhttp://www.metafilter.com/50714/ATampTNSA%2DWTF%2DEFF
<a href="http://www.eff.org/news/archives/2006_04.php">EFF Accuses AT&T of diverting internet traffic to NSA.</a> <em>"More than just threatening individuals' privacy, AT&amp;T's apparent choice to give the government secret, direct access to millions of ordinary Americans' Internet communications is a threat to the Constitution itself. We are asking the Court to put a stop to it now."</em>
More <a href="http://www.eff.org/legal/cases/att/">details </a>from the EFF. tag:metafilter.com,2006:site.50714Fri, 07 Apr 2006 07:27:06 -0800jikel_morten